Introduction
Welcome 0:53 4.3 MB
1. Getting Started
The basics 7:50 10.5 MB
The threats 6:59 9.9 MB
The impact of security and privacy breaches 6:24 8.5 MB
Microsoft's 10 immutable laws of security 4:14 5.7 MB
2. Firewall Essentials
What are firewalls and how do they work? 9:17 13.6 MB
What firewalls can't do 2:52 3.9 MB
Hardware versus software firewalls 4:45 6.7 MB
Setting up and securing a hardware firewall/router 11:30 18.2 MB
Configuring and using the firewall in Windows XP 4:03 5.8 MB
Configuring and using the firewall in Windows XP SP2 3:23 3.8 MB
Configuring and using the firewall in Mac OS X 3:40 3 MB
Commercial and free software firewalls pt 1 7:45 11.9 MB
Commercial and free software firewalls pt 2 7:15 8.6 MB
Testing your firewalls 1:25 1.9 MB
Sygate Online Services 14:36 24.2 MB
Shields Up 7:00 15 MB
3. Wireless Security Essentials
How wireless networks work and how to secure them 20:53 29.2 MB
Wireless encryption 101 11:10 15.1 MB
Securing a Linksys wireless router 16:05 23.8 MB
Securing a D-Link wireless router 8:26 15 MB
Securing a NETGEAR wireless router 9:18 17.5 MB
Securing an Apple Airport 11:30 18.5 MB
Connecting your PC to a secure wireless network 8:41 9.6 MB
4. Patch Management Essentials
Why patch? 10:42 14.2 MB
What is patch management? 3:52 5.5 MB
Running Microsoft Update 9:15 15.4 MB
Running Apple Software Update 2:07 2.8 MB
Patching other software 6:51 13.3 MB
Dealing with exploits on unpatched computers 6:43 12.2 MB
Patch hoaxes 4:23 5.5 MB
5. Antivirus Essentials
Definitions 12:06 14 MB
Why is antivirus software necessary? 5:53 7.7 MB
Picking an antivirus solution 5:16 8.5 MB
Configuring your antivirus 7:06 5.9 MB
Updating your antivirus definitions 2:29 3 MB
Renew or uninstall? 1:10 0.9 MB
Virus hoaxes 5:12 11.2 MB
6. Antispyware Essentials
Definitions, damage, and how spyware gets installed 9:15 12.5 MB
Spyware detection and removal 4:37 5.7 MB
****ies 4:18 5.7 MB
How to download and run Spybot Search and Destroy 6:18 8.4 MB
How to download and run Lavasoft Ad-Aware 6:29 8 MB
How to run Hijack This and post a log 8:03 17 MB
How to download and run MacScan 5:14 8.7 MB
Fake antispyware 4:53 10.6 MB
7. Safe Surf
What is safe surf? 8:37 11 MB
Ditch or secure Internet Explorer 11:24 16.3 MB
Why P2P is so dangerous 8:48 12.7 MB
8. Backup Essentials
The implications of MTBF 4:48 6.5 MB
What to back up and how 14:25 16.3 MB
The myth of the 100 year CD 3:12 3.8 MB
9. The Weekly Fab Five
What is the 'Weekly Fab Five'? 1:33 2 MB
One: Update your antivirus/antispyware 3:27 3.4 MB
Two (PC): Update your OS (Windows Update) 3:14 3.4 MB
Two (Mac): Update your OS (Apple Software Update) 1:54 2.3 MB
Three (PC): Check your hard drive (Windows) 4:56 3.4 MB
Three (Mac): Check your hard drive (Macintosh) 4:29 6.8 MB
Four: Defragment your hard drive 3:49 3 MB
Five: Back up your data 2:07 2.8 MB
10. Additional Computer Privacy and Security
Extra stuff? 2:35 3.3 MB
Displaying hidden file extensions on a PC 4:10 4.9 MB
Disabling Auto-Run on a PC 3:30 5.5 MB
Removing private information from Microsoft Office documents 4:55 10 MB
Creating secure documents with Adobe Acrobat 5:22 8.8 MB
Disabling universal plug and play 3:58 8 MB
11. Safe, Secure, and Private Browsing
Protecting your children online 11:45 25.3 MB
Safe online purchasing 9:06 17 MB
Best practices for creating secure passwords 8:16 11 MB
Clearing your tracks in Internet Explorer 6.x 7:06 14.1 MB
Clearing your tracks in Firefox 1.x 5:29 8.5 MB
Clearing your tracks in Safari 3:19 5.3 MB
12. Email Security Essentials
Web bugs and HTML mail 8:22 10 MB
How to safely handle email attachments 2:55 3.4 MB
How to spot phishing scams 10:07 18.3 MB
13. Media Wiping
How to deep clean your computer before you give it away 5:27 8.1 MB
How to destroy media backups 3:35 4.7 MB
14. Conclusion
Where to get more information on security training and certification 2:53 4.5 MB
Goodbye 0:16 1.1 MB
المفضلات